• New Method Tracks Groups of Anomalous Users

    Malicious or fictitious users on internet networks have become the bane of the internet’s existence. Many bemoan the increasing presence of such users, but few have developed methods to track and expose them. Until now.

  • Revised Guidelines for Digital Identification in Federal Systems

    NIST’s draft publication features updates intended to help fight online crime, preserve privacy and promote equity and usability.

  • Protecting DoD Microelectronics from Adversary Influence

    The NSA publicly released four Cybersecurity Technical Reports to help the Department of Defense protect field-programmable gate array (FPGA)-based systems from adversary influence.

  • Testing Environments Help Secure Transportation Infrastructure

    “All critical infrastructure sectors—including the energy, manufacturing, and transportation sectors—rely heavily on sophisticated technologies like industrial control systems, cellular networks, and artificial intelligence,” said DHS S&T’s Alex Karr. “These are all accessed, monitored, and controlled via the internet, which, in turn, makes them susceptible to hacking, malware attacks, and other malicious activities.”

  • New ‘Faraday Cage’ Research Facility to Help Combat Digital Crime

    University of Huddersfield installing a new facility named the ‘Faraday Cage’ which will help speed-up the development and testing of new digital forensic processes to help law enforcement meet the huge growth rate in digital crime.

  • Major Global Security Challenges

    What are the major threats the world is facing? Researchers highlight five such threats: The growing role of disinformation; attacks on the idea of democracy; environmental challenges; economic instability; and terrorism – both domestic and foreign.

  • Mathematics Works in Serendipitous Ways

    In the digital era and moving towards quantum computing, protecting data against hack attacks is one of our biggest challenges. Mathematical theorem used to crack U.S. government encryption algorithm.

  • Smart Inverters’ Vulnerability to Cyberattacks Needs to Be Identified and Countered

    A survey of threats to microgrids from small power sources can help security experts develop solutions.

  • Consumers Feel Left Out of Debates on Cyberattacks and Data Security

    Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.

  • Simple Hardware to Defend Against Microgrid Attacks

    An inexpensive piece of hardware integrated with solar panel controllers can protect isolated power networks from cyberattacks.

  • Examining Vulnerabilities of Electric Vehicle Charging Infrastructure

    With electric vehicles becoming more common, the risks and hazards of a cyberattack on electric vehicle charging equipment and systems also increases. Reviewing the vulnerabilities of EV charging infrastructure would help prioritize grid protections and informs policy makers.

  • The Human Side of Cybersecurity

    We might think of cybersecurity as being mostly about firewalls, antivirus software, spam filters, and dDOS detection, but it is often social engineering and human failure that leads to breaches of computer systems and networks rather than sophisticated malware.

  • Smart Home Hubs Leave Users Vulnerable to Hackers

    Machine learning programs mean even encrypted information can give cybercriminals insight into your daily habits.

  • Why Do Self-Driving Cars Crash?

    As they traverse the air, land, or sea, encountering one another or other obstacles, these autonomous vehicles will need to talk to each other. Experts say we need to inject cybersecurity at every level of the autonomous vehicle networks of the future.

  • Cybercrime Insurance Is Making the Ransomware Problem Worse

    Cybercrime insurance is making the ransomware problem worse During the COVID-19 pandemic, there was another outbreak in cyberspace: a digital epidemic driven by ransomware. Businesses are turning to cyberinsurance companies in desperation to protect themselves from attack. But the growth of the cyberinsurance market is only encouraging criminals to target companies that have extortion insurance.